Ciphertext indistinguishability

Results: 264



#Item
61RSA / Optimal asymmetric encryption padding / Denotational semantics / ElGamal encryption / Cryptographic hash function / Random oracle / XTR / Function / Digital signature / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Formal certification of ElGamal encryption A gentle introduction to CertiCrypt ⋆ Gilles Barthe1 , Benjamin Gr´egoire2,3, Sylvain Heraud3 , and

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
62Mathematics / Knowledge / Mathematical proof / Science / Cryptography / Ciphertext indistinguishability / Optimal asymmetric encryption padding

Programming Language Techniques for Cryptographic Proofs

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English - Date: 2013-06-17 13:32:36
63Ciphertext indistinguishability / Public-key cryptography / Mathematical proof / Concrete security / Random oracle / RSA / Equivalence relation / Cryptography / Optimal asymmetric encryption padding / Mathematical logic

Beyond Provable Security: Verifiable IND-CCA Security of OAEP

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English - Date: 2013-06-17 13:32:36
64Mathematics / Knowledge / Mathematical proof / Science / Cryptography / Ciphertext indistinguishability / Optimal asymmetric encryption padding

Programming Language Techniques for Cryptographic Proofs

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
65Adaptive chosen-ciphertext attack / Optimal asymmetric encryption padding / Zero-knowledge proof / ElGamal encryption / Symmetric-key algorithm / RSA / Chosen-ciphertext attack / Cryptography / Public-key cryptography / Ciphertext indistinguishability

1234145467836391829836846489A2BCBD183 École doctorale nO 84 : Sciences et technologies de l’information et de la communication Doctorat ParisTech

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
66ElGamal encryption / Public-key cryptography / Ciphertext indistinguishability / Diffie–Hellman problem / Decisional Diffie–Hellman assumption / Optimal asymmetric encryption padding / Cramer–Shoup cryptosystem / Cryptography / Computational hardness assumptions / Finite fields

Formal Certification of Code-Based Cryptographic Proofs GILLES BARTHE and SANTIAGO ZANELLA BEGUELIN IMDEA Software, Madrid, Spain and BENJAMIN GREGOIRE

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English - Date: 2013-06-17 13:32:36
67Optimal asymmetric encryption padding / Chosen-ciphertext attack / Chosen-plaintext attack / Signcryption / Cipher / Symmetric-key algorithm / RSA / Probabilistic encryption / Semantic security / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Committing Encryption and Publicly-Verifiable SignCryption Yitchak Gertner Amir Herzberg

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-12-17 04:10:40
68Ciphertext indistinguishability / Cryptography

Publicly Verifiable Software Watermarking Aloni Cohen∗ Justin Holmgren† Vinod Vaikuntanathan‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-27 00:38:23
69Abstract algebra / Linear algebra / Cryptography / Theoretical computer science / Vector space / Vehicle Identification Number / Matrix / Ciphertext indistinguishability / Algorithm / Algebra / Mathematics / Vectors

Nearly Optimal Verifiable Data Streaming Johannes Krupp1 , Dominique Schr¨ oder1 , Mark Simkin1 , Dario Fiore2 , Giuseppe Ateniese3,4 , and Stefan Nuernberger1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-20 09:30:26
70Public-key cryptography / Digital signature / Key management / Notary / Ciphertext indistinguishability / Computational complexity theory / Reduction / Security parameter / RSA / Cryptography / Theoretical computer science / Applied mathematics

On the Impossibility of Tight Cryptographic Reductions Christoph Bader, Tibor Jager, Yong Li, and Sven Sch¨age Horst G¨ortz Institute for IT Security, Ruhr-University Bochum, Germany {christoph.bader, tibor.jager, yong

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-27 06:52:51
UPDATE